Ready or not, two-factor R authentication (fave.co/3co510T) is something you'll need to start thinking more about.
This approach to online security, also known as two-step authentication, multifactor authentication, or just 2FA for short, involves combining a regular password with a secondary numeric code, which you must enter on any device where you haven't logged in before. This extra code typically gets sent to your phone, so someone who steals your password can't get into your account unless they have physical access to your phone as well (and know how to unlock it).
The added annoyance of 2FA is well worth the extra security it provides, which is why some tech companies have now started requiring it. Google (fave.co/3Vbq5vy) and Amazon’s Ring (fave.co/3Wfom9W) both made 2FA mandatory last year, and it’s on by default for most Apple IDs (fave.co/3G8FCIt). I’ve also noticed Amazon selectively enforcing 2FA on it apps and website, sending a link to click on via text message when you login on a new device.
While these are all positive steps, the smartest approach to 2FA isn’t merely passive. Many of these 2FA methods work by texting a code to your phone, which is better than nothing but is susceptible to potentially devastating SIM hijacking attacks (fave.co/3WbHZ2N). (The FCC is only now starting to examine that problem; fave. co/3YwAZ25.) And if your phone gets lost or stolen, you’ll want to have a backup 2FA method at the ready.
If you’re ready to take 2FA more seriously, here are some options to consider:
USE AN AUTHENTICATOR APP
Bu hikaye PCWorld dergisinin January 2023 sayısından alınmıştır.
Start your 7-day Magzter GOLD free trial to access thousands of curated premium stories, and 9,000+ magazines and newspapers.
Already a subscriber ? Giriş Yap
Bu hikaye PCWorld dergisinin January 2023 sayısından alınmıştır.
Start your 7-day Magzter GOLD free trial to access thousands of curated premium stories, and 9,000+ magazines and newspapers.
Already a subscriber? Giriş Yap
Private Internet Access: A low-price, high-value VPN for everyone
This veteran VPN shows it can still hang with the best.
Hands-on: Kensington's first Thunderbolt 5 dock is built for the future
Thunderbolt 5 is here...but you'll need more than just this well-built Kensington dock to take advantage of it.
Tested: Intel's Lunar Lake chip wants you to forget Qualcomm laptops exist
Great battery life, mediocre performance, surprisingly decent gaming: That is how Intel's Lunar Lake chip stacks up.
7 laptop habits that coax the most out of your battery
Don't send your laptop into an early grave.
WordPad is gone from Windows 11. Here's how to bring it back
With the arrival of Windows 11 version 24H2, WordPad is officially gone. Want to keep using it? You're in luck.
Hackers know your social security number. Here's how to stay safe
Thanks to a multitude of data leaks, your most sensitive information is now easily accessible to the world.
20 insanely useful Windows 11 keyboard shortcuts I use every day
After so many years, I'm still discovering new keyboard shortcuts.
WHAT THE HECK IS AN NPU, ANYWAY? HERE'S AN EXPLAINER ON AI CHIPS
ALL PCS WILL SOON HAVE NEURAL PROCESSING UNITS. HERE'S WHAT THAT MEANS FOR YOU IN SIMPLE TERMS.
WINDOWS 11'S 2024 UPDAATE: 5 BIG CHANGES I REALLY LIKE (AND MORE)
WINDOWS 11'S ANNUAL UPDATE IS ROLLING OUT OVER THE NEXT FEW WEEKS.
Hackers are using AI-generated code for malware attacks
Two separate attacks have been spotted using code that was probably written by artificial intelligence.